Blog, News & FAQ

Social Engineering

Social Engineering

You walk into the office on Monday morning, and the first thing your colleague says is; “Did the password I sent you this weekend work to get into the accounting files?” You have absolutely no clue what they’re talking about, so you look at them in confusion. Your colleague goes on to say, “The password? […]

4 Ways to Combat Social Phishing Attacks

4 Ways to Combat Social Phishing Attacks

Phishing, in all its forms, is the most common method of cyber-attack and has been responsible for everything from ransomware to credential theft part. Cyber criminals are carefully crafting these attacks to mimic your trusted partners (banks, streaming services, governments, etc.) to trick us all into giving away our information and to gain access to […]

The 4 Pillars of IT

The 4 Pillars of IT

Most business experts agree that Finance, Operations, H.R, and Sales are the key areas of every business’s operations that must be managed for a successful outcome. It is our opinion that Information Technology needs to be included in those planning and strategy conversations as well. The problem is that most business operators don’t have a […]